Our search has the following Google-type functionality:
If you use '+' at the start of a word, that word will be present in the search results.
eg. Harry +Potter
Search results will contain 'Potter'.
If you use '-' at the start of a word, that word will be absent in the search results.
eg. Harry -Potter
Search results will not contain 'Potter'.
If you use 'AND' between 2 words, then both those words will be present in the search results.
eg. Harry AND Potter
Search results will contain both 'Harry' and 'Potter'.
If you use 'OR' between 2 words, then either or both of those words will be present in the search results.
eg. 'Harry OR Potter'
Search results will contain just 'Harry', or just 'Potter', or both 'Harry' and 'Potter'.
If you use 'NOT' before a word, that word will be absent in the search results. (This is the same as using the minus symbol).
eg. 'Harry NOT Potter'
Search results will not contain 'Potter'.
If you use double quotation marks around words, those words will be present in that order.
eg. "Harry Potter"
Search results will contain 'Harry Potter', but not 'Potter Harry'.
If you use '*' in a word, it performs a wildcard search, as it signifies any number of characters. (Searches cannot start with a wildcard).
Search results will contain words starting with 'Pot' and ending in 'er', such as 'Potter'.
The Mathematics of Secrets takes readers on a fascinating tour of the mathematics behind cryptography - the science of sending... [more]
Beginning with the foundational and technical components of information security, this title focuses on access control models,... [more]
This is a comprehensive, up-to-date revision of the market-leading CISSP training resource from the #1 name in IT security... [more]
Since being introduced in the late nineties, Cascading Style Sheets or CSS has become an indispensable tool for every web... [more]
This hands-on guide to hacking Microsoft's powerful video games console starts with step-by-step tutorials on hardware modification... [more]
Originally published in hardcover in 2015 by The MIT Press. [more]
Globally recognized and backed by the Cloud Security Alliance (CSA) and the (ISC)2 the CCSP credential is the ideal way to... [more]
This book introduces the fundamental concepts of homomorphic encryption. From these foundations, applications are developed... [more]
<strong>SAVE when you buy the CISSP(R) Boxed Set, plus bonus DVD!</strong></p> <strong>Bonus DVD contains audio and video... [more]
Offers readers of all backgrounds and experience levels a well-researched and engaging introduction to the realm of network... [more]
This book covers public-key cryptography, describing in depth all major public-key cryptosystems in current use, including... [more]
This advanced graduate textbook gives an authoritative and insightful description of the major ideas and techniques of public... [more]
As a society that relies on technology to thrive, we face a growing number of potentially catastrophic threats to network... [more]
IT Security and Risk Management is an original textbook written for undergraduate subjects on IT and e-business security,... [more]
Kevin Mitnick, the world's most celebrated hacker, now devotes his life to helping businesses and governments combat data... [more]
Shows readers how to strengthen the weak spots they find in their network's armor. This book enables readers discover how... [more]
Focusing on the human factors involved with information security, this book explains why all the firewalls and encryption... [more]
CNN is reporting that a vicious new virus is wreaking havoc on the world's computer networks. Somebody's hacked one of your... [more]
In 25 concise steps, you will learn the basics of blockchain technology. No mathematical formulas, program code or computer... [more]
This book mainly concentrates on protecting data security and privacy when participants communicate with each other in the... [more]
Presents the latest research on the development of smart grid technology and best practices of utilization. Featuring extensive... [more]
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set... [more]
Advanced Persistent Threat Modeling is an in-depth guide to targeting and compromising high-security environments. With it,... [more]
This book provides an overview of current Intellectual Property (IP) based System-on-Chip (SoC) design methodology and highlights... [more]
Take advantage of Bitcoin's underlying technology, the blockchain, to build massively scalable, decentralized applications... [more]